General
-
Target
5980150a9b9d581b94a9cb6b8847b371_JaffaCakes118
-
Size
13.1MB
-
Sample
241018-1jgzla1hrk
-
MD5
5980150a9b9d581b94a9cb6b8847b371
-
SHA1
230fa44c4240d10ac2033b003f093d6558c7bedf
-
SHA256
1ab2488d36ca3a77d48e695c17e6d53ab072e5f10f368b74a718649b9c32b14c
-
SHA512
4b63d8639db8a75b5b7349aaab83bd7c360a119337f72217a64816d582e543e1c77337add68e44c7d75793002974dce08e6c03dcecd20b91460b2ef8ef395f9d
-
SSDEEP
393216:BKGmxHuGskGSu6TmlHwBFhPICHaf9pn5puWHFzL2HQyRG1:BuxPvTmtwfJTupFFyRG1
Static task
static1
Behavioral task
behavioral1
Sample
5980150a9b9d581b94a9cb6b8847b371_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
5980150a9b9d581b94a9cb6b8847b371_JaffaCakes118
-
Size
13.1MB
-
MD5
5980150a9b9d581b94a9cb6b8847b371
-
SHA1
230fa44c4240d10ac2033b003f093d6558c7bedf
-
SHA256
1ab2488d36ca3a77d48e695c17e6d53ab072e5f10f368b74a718649b9c32b14c
-
SHA512
4b63d8639db8a75b5b7349aaab83bd7c360a119337f72217a64816d582e543e1c77337add68e44c7d75793002974dce08e6c03dcecd20b91460b2ef8ef395f9d
-
SSDEEP
393216:BKGmxHuGskGSu6TmlHwBFhPICHaf9pn5puWHFzL2HQyRG1:BuxPvTmtwfJTupFFyRG1
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-